Summary Of Blue Pill

Improved Essays
This abstract is a summary of research into malware called ‘Blue Pill’. It was developed by a security researcher named Joanna Rutkowska, a low-level security and stealth malware researcher. Her intention was to show that a prototype malware, code-named Blue Pill, could "100 percent undetectable” (Vaas, 2007). She created it as part of a research project. It worked by bypassing Microsoft 's digital signature protection for kernel mode drivers. The Blue Pill malware is like the movie, “The Matrix”. The user was unable to distinguish between what was real and what was not (Heary, 2016). They would therefore continue to use the system as if it were secure, when they were actually revealing valuable data to hackers.

A blue
…show more content…
She wanted to prove that she could create a collection of computer software that would remain undetectable (Vaas, 2007). How did it work? It manipulated registers, input/output, and registers, among other processes, for virtual operations at the hardware level (Beaver, 2016). It exploited the fact that the virtualization technology was vulnerable, and entered the system through administrative access. When users installed a new version of Windows, they usually installed many programs and services of which they were not aware (South University Online, 2016). The ‘Blue Pill’ took advantage of this vulnerability and infected the virtual system. Therefore, in a business setting, it is best to have the system administrators control the installation and upgrades of any software to the system because they will be more aware of any system …show more content…
However, in order to understand what the malware does, it is necessary to understand the working of the computer system. At the core of the system is the kernel, or nucleus. This is a computer program that is the core of the system. It controls everything in the system and is the first program loaded at the startup (Rouse, 2016). It is normally loaded into a protected area of memory and takes requests from the software and translates it for use by the

Related Documents

  • Improved Essays

    The Win32/Sogou is a dangerous Trojan Downloader that invades the windows based PCs without getting permission from the user. This malicious application spreads through social media websites and can destroy a computer in a way that it becomes useless permanently. This tricky Trojan application is developed by the hackers to get remote access of the data and system folders in computer. Dalhousie University dataset contains both botnet and benign traces.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Please research one virus and one worm, and write a maximum 2-page single-spaced paper explaining what each of them is, what they do, what their impact was, what the mechanics of how they work are (the technical aspect), and how were they stopped. Computer virus: It is a piece of code which is loaded onto the computer without the user knowledge and runs itself. When this code is executed, it makes a copy of itself and inserts this copy into another computer programs, data files of the hard drive. Such small virus also steals hard disk space and CPU time , corrupts data.…

    • 1405 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy (Malware). Malware is able to accomplish this by its works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user. The type of malware that could be used is a Rootkit Malware. A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executable.…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    How do programmers get to your system? Programmers have no exact way that they get to your framework. They may utilize an infection or in the event that they have direct access to your framework they will utilize a blaze drive, Denial-of-Service Attacks and the Trojans and Rootkits. 8.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    In class we discussed the pink pill. I was not even aware that this type of pill existed. I was also surprised to learn that this pill is not like Viagra. Viagra is a pill used by men that has to do with the physical body whereas the pink pill affects a woman’s sex drive, which is a cognitive issue. I continued my research of the pink pill and found that the FDA put a number of restrictions on the usage of this pill.…

    • 211 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    In Celine Gounder’s article Who is Responsible for the Pain-Pill Epidemic? we see one doctors’ search for who is to blame for the current state of opioid dependency in America. What happened and how it happened occupy the first few pages of her article. In 1980 and in 1986 “two small accounts in medical journals” (Gounder) seemed to suggest that opioids weren’t that bad.…

    • 436 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Blown To Bits Book Report

    • 871 Words
    • 4 Pages

    The book Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis has often given me the impression that this book was intended to warn its audience of the many dangers of technology, and that the benefits of using technology are not worth the risks. The book’s third chapter, “Ghosts in the Machine,” however, was different, because I noticed that the authors were just giving information about things that computers do that people may not realize, but not necessarily implying that all of these abilities are dangerous or harmful. For this reason, and for many other reasons, I enjoyed reading this chapter of Blown to Bits more than I have enjoyed reading any other chapter so far. The first topic discussed in this chapter left me with feelings of both concern and relief.…

    • 871 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    The contraceptive Plan B pill has been the main source of controversy since the approval of the FDA decision to make it available over the counter with no age restrictions back in 2013. Many women across the United States have to deal with unplanned pregnancies each year, and most deciding whether or not they should continue with the pregnancy or end it. The Food & Drug Administration along with the United States Department of Health authorized a highly ‘morning-after pill or more known to as Plan B. Plan B is available upon without a doctor 's prescription to girls over the age of fifteen. The process of the pill was never easy nor smooth as the Food & Drug Administration (FDA) spent long dreadful years wrangling before upon approval of the pill. It also needed an additional three years to allow Congress to enact the legislative measure to ensure the medication is legit.…

    • 989 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The Yellow Pills Analysis

    • 849 Words
    • 4 Pages

    Out Of Reality’s Touch Is he Gar Castle or is he Dr. Cedric Elton? The question is vivid in the minds of the people reading Rog Phillips’ “The Yellow Pill”. In “The Yellow Pill”, a character named Gerald Bocek questions Dr. Elton’s perception of reality by trying to convince him that they are in space instead of Earth. It is evident that the setting is on Earth; therefore, Dr. Elton’s reality is the truth.…

    • 849 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    The “morning after pill” controversy can be understood using a social justice framework in the sense that it can be gender biased. Contraception has little to no affect on men than women/a much higher affect on women than it does on men (don’t know which one). Taking the pill affects women both emotionally and physically, as she has to make the emotional decision to stop a pregnancy from occurring and physically because taking the pill could possibly lead to complications. In a way (I should start off with something else) it promotes sexual violence. It can be seen that the pill was designed as a solution for men so they can have unprotected sex for more pleasure or if there is no consent from the woman, it’s okay because a woman can just take…

    • 318 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Pills In Brave New World

    • 785 Words
    • 4 Pages

    In the satire novel Brave New World, there has been quite many spectacular changes around the modern city, which automatically gives them an image of a civilized city. The change that has been the most exciting and interesting would be the fact of using engineered blue pills in order to enhance the lack of certain emotions and other sorts, but this has its own positive and negative sides. Undoubtedly, we have many similarities and differences in this scenario as we talk about the controlling medication. In the novel Brave New World we notice that they take a blue pill, I believe its twice a day in order to disable any types of emotions from encountering their minds or feelings as they take the pill it removes the ability to feel love, pain,…

    • 785 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Choosing the blue pill results in your memory being wiped and you forgetting all about the Matrix, and you go back to your normal life. Choosing the red pill, however, allows you to be freed from the Matrix's programming and you can leave and enter the Matrix at your own option. The world of the Matrix is ruled by machines and programs who determine you fate. Choices for all those who are stilled plugged into the Matrix is just illusions of choice. But for all those who chose the red pill or been born outside of the Matrix have freewill to make their own choices and make mistakes both in the real world and in the Matrix.…

    • 337 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    We all know people use drugs to escape reality or to have a good time but in reality it’s a killer. Party drugs are usually hallucinogens such as LSD or ecstasy and stimulants like cocaine, weed and amphetamines. Drug use happens everywhere especially at parties or concerts and it can be very dangerous, leading to violence and/or death. According to a survey from the Drug Info website 10.9% of Australians aged 14 years and over have used ecstasy one or more times in their life.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In the United States, there were 309,060 teen pregnancies from the ages of 15 to 19 (Duffy 1). These numbers are alarming because teen pregnancy can cause many bumps along the road. There are many ways to prevent teen pregnancy, such as, condoms, birth control, and simply abstinence. However, when everything else fails there is an emergency contraception that helps prevent pregnancy, which is the morning-after pill. The morning-after pill is an emergency contraception taken after unprotected sex or when any mishaps occur with any of the birth control method.…

    • 912 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Lab 1

    • 618 Words
    • 3 Pages

    Lab 2: OSI Model Introduction: This lab expanded upon the first, by outlining in greater depth, the Open Systems Interconnect (OSI) Reference Model. In particular, we covered how this model shapes and forms the key structure of all computer network communication. Covered in the first lab, the layers involved are physical, data link, network, transport, session, presentation and application. The lab portrayed the flow information traffic as movement through a series of ports, similar to entering doors of houses owned by other people.…

    • 618 Words
    • 3 Pages
    Improved Essays